About your Search

20121112
20121120
Search Results 0 to 2 of about 3
was put in place in 1992. it was to be a temporary measure. it was going to boost the new technology. 20 years later, president obama's respected energy secretary says wind is a mature technology. and what have we got after 20 years and billions of dollars of subsidies? a puny amount of unreliable electricity. our country uses nearly 25% of all the electricity in the world. wind produces 3% of that. of course, it only produces it when the wind blows. it's not easy to store it. so it is of limited use in a country that needs huge amounts of low-cost, clean, reliable electricity. relying on wind power is the energy equivalent of going to war in sailboats when nuclear submarines are available. the wind subsidy is so large, mr. president, that wind developers are now paying distributors to take their wind power under cutting the base load energy plants that are necessary to provide the reliable electricity we need for the country. and on top of that, there are better ways to produce clean electricity, better ways than subsidizing a technology that destroys the environment in the name of savi
of government response, that technology is really just a piece of the answer. you need to have technology on your networks help identify when there's a breach to give you much greater understanding about what's happening on your networks, to look for these intrusions and these incursions into your network. that is a piece of the solution, and part of it is the caller said is really having the discussion with nations that are aggressively pursuing this. there are dozens of countries have these electronic espionage capabilities in place. a specific programs where they're targeting western networks exfiltrate data to empower their private sector, to empower their manufacturing base, the retail base, the research and development programs. they're doing at the expense of the american taxpayer. >> host: where is congress on the cybersecurity legislation? >> guest: there are more than 40 bills right now that are on the hill. covering a whole range of cybersecurity issues. some of these bills have been bouncing around for five years or more. and i recognize understand it's an incredibly complex i
within two points. the technology included the so-called orca system. many of you have read about that in the last couple of days, which was the republican get out the vote technology to ensure that we were targeting people getting to the polls. i'm told on election day actually got so many hits around the country as it should have from people saying this person voted this person didn't vote, they thought it was under attack and close down. so for those of you here from again detect elegies field and with interest in politics, we republicans want to talk to you. we need some help. the democratic system i think is called gordon was actually quite effective at mike retargeting. i heard one this morning it was. somebody get the call who is a democrat, who is in law school and police chief, we see you have voted. the information is publicly available. it's at 2:00 on election day, but your sister at tulane has not voted. could you call her? that is the level at which they were dealing, whereas we frankly were flying blind at that point. part of it is to elegy and not lead to a turnout
Search Results 0 to 2 of about 3